Please turn on your JavaScript for this page to function normally.
Solera Networks offers visibility into potential security breaches

Solera Networks unveiled the DeepSee BlackBox Recorder, which continuously and silently captures all network traffic – including packets, flows, files and applications. …

Two Japanese web portals hacked, user financial info compromised

Personal and financial information belonging to users of two big Japanese web portals has been compromised earlier this week, Computerworld reports. On Tuesday evening, Yahoo …

Facebook’s in-house drills were crucial for smooth response to watering hole attack

Facebook was the first company to admit publicly to have been affected by the recent watering hole attack that started with a compromised forum site popular with mobile …

3 out of 4 infosec pros unsure they would spot a breach

LogRhythm announced the results of its 2nd Annual Cyber Threat Readiness Survey of 150 IT security professionals on their organizations’ readiness to address advanced …

Helping ISPs defend customers against bot infections

At RSA Conference 2013 Kindsight announced the Kindsight Botnet Security service to help Internet service providers detect botnet activity in the network and protect …

Stonesoft updates its free advanced evasion testing tool

At RSA Conference 2013 in San Francisco, Stonesoft released Evader 2.01, an updated version of their advanced evasion software testing tool. Since its initial release at Black …

Trend Micro solutions detect C&C communications used by ATPs

Trend Micro is introducing new advances in its Custom Defense solution that focus on identifying and blocking the command and control (C&C) communications used by …

AhnLab offers dynamic disruption of active security breaches

At the RSA Conference 2013 in San Francisco, AhnLab announced the AhnLab Malware Defense System (MDS), an enterprise strength security system that combines local and …

Big Data capabilities crucial for effective cyber defense, says study

A study from a top cybersecurity analyst firm confirms that big data analytics offer a powerful arsenal for cyber security, but adoption is alarmingly slow. The report, …

Wall Street Journal says it has also been hacked

A day after the New York Times revealed that its network and the computers of 53 of their employees have been compromised by hackers believed to be based in China, the Wall …

China-based hackers infiltrated New York Times’ network

The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …

The importance of data normalization in IPS

To fully comprehend the importance of data normalization in an Intrusion Prevention System, it is first necessary to understand what data normalization is and what it does, …

Don't miss

Cybersecurity news